From 779fd983e5d51d11bc71cf0073553b9ab0a070b8 Mon Sep 17 00:00:00 2001 From: Christophe Maudoux Date: Fri, 28 Aug 2020 21:53:19 +0200 Subject: [PATCH] Typo (#2302) --- lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Lib/SAML.pm | 2 +- .../lib/Lemonldap/NG/Portal/Plugins/CertificateResetByMail.pm | 2 +- .../lib/Lemonldap/NG/Portal/Plugins/CheckUser.pm | 4 ++-- .../lib/Lemonldap/NG/Portal/Plugins/ContextSwitching.pm | 4 ++-- .../lib/Lemonldap/NG/Portal/Plugins/GlobalLogout.pm | 2 +- .../lib/Lemonldap/NG/Portal/Plugins/Impersonation.pm | 4 ++-- .../lib/Lemonldap/NG/Portal/Plugins/MailPasswordReset.pm | 2 +- .../lib/Lemonldap/NG/Portal/Plugins/SingleSession.pm | 2 +- lemonldap-ng-portal/t/40-Notifications-Explorer-JSON-File.t | 4 ++-- lemonldap-ng-portal/t/40-Notifications-Explorer-XML-File.t | 4 ++-- lemonldap-ng-portal/t/40-Notifications-JSON-DBI.t | 2 +- lemonldap-ng-portal/t/40-Notifications-JSON-File-with-token.t | 2 +- lemonldap-ng-portal/t/40-Notifications-JSON-File.t | 4 ++-- lemonldap-ng-portal/t/40-Notifications-JSON-LDAP.t | 2 +- lemonldap-ng-portal/t/40-Notifications-XML-DBI.t | 2 +- lemonldap-ng-portal/t/40-Notifications-XML-File.t | 4 ++-- .../t/58-DecryptValue-with-internal-function.t | 4 ++-- lemonldap-ng-portal/t/67-CheckUser.t | 4 ++-- 18 files changed, 27 insertions(+), 27 deletions(-) diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Lib/SAML.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Lib/SAML.pm index c36a2aec0..77c630b21 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Lib/SAML.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Lib/SAML.pm @@ -3063,7 +3063,7 @@ sub sendSLOErrorResponse { "Could not set empty session in logout object", 500 ); } - # Send unvalidated SLO response + # Send invalidated SLO response return $self->sendLogoutResponseToServiceProvider( $req, $logout, $method ); } diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CertificateResetByMail.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CertificateResetByMail.pm index bf44c7218..8a9ee3661 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CertificateResetByMail.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CertificateResetByMail.pm @@ -234,7 +234,7 @@ sub _certificateReset { ); if ( my $error = $self->p->process( $req, useMail => $searchByMail ) ) { if ( $error == PE_USERNOTFOUND or $error == PE_BADCREDENTIALS ) { - $self->userLogger->warn( 'Reset asked for an unvalid user (' + $self->userLogger->warn( 'Reset asked for an invalid user (' . $req->param('mail') . ')' ); diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CheckUser.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CheckUser.pm index e114f726e..96b3e771b 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CheckUser.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/CheckUser.pm @@ -274,7 +274,7 @@ sub check { $self->logger->info("\"$user\" is an unrestricted user!") if $unUser; unless ( $unUser || $self->idRule->( $req, $attrs ) ) { $self->userLogger->warn( - "checkUser requested for an unvalid user ($user)"); + "checkUser requested for an invalid user ($user)"); $req->{sessionInfo} = {}; $self->logger->debug('Identity not authorized'); $req->error(PE_BADCREDENTIALS) @@ -427,7 +427,7 @@ sub _userData { if ( my $error = $self->p->process($req) ) { if ( $error == PE_BADCREDENTIALS ) { $self->userLogger->warn( - 'checkUser requested for an unvalid user (' + 'checkUser requested for an invalid user (' . $req->{user} . ")" ); } diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/ContextSwitching.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/ContextSwitching.pm index 8a9422921..8caafabc4 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/ContextSwitching.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/ContextSwitching.pm @@ -216,7 +216,7 @@ sub _switchContext { ); if ( my $error = $self->p->process($req) ) { $self->userLogger->warn( - 'ContextSwitching requested for an unvalid user (' + 'ContextSwitching requested for an invalid user (' . $req->{user} . ")" ) if ( $error == PE_BADCREDENTIALS ); @@ -229,7 +229,7 @@ sub _switchContext { $self->logger->info("\"$realId\" is an unrestricted user!") if $unUser; unless ( $unUser || $self->idRule->( $req, $req->sessionInfo ) ) { $self->userLogger->warn( - 'ContextSwitching requested for an unvalid user (' + 'ContextSwitching requested for an invalid user (' . $req->{user} . ")" ); $self->logger->debug('Identity NOT authorized'); diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/GlobalLogout.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/GlobalLogout.pm index 9123a9cd2..5bfbe31dd 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/GlobalLogout.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/GlobalLogout.pm @@ -139,7 +139,7 @@ sub globalLogout { } else { $self->userLogger->warn( - "GlobalLogout called with an unvalid token"); + "GlobalLogout called with an invalid token"); $res = PE_TOKENEXPIRED; } } diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/Impersonation.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/Impersonation.pm index 70d6766aa..034af79f6 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/Impersonation.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/Impersonation.pm @@ -215,7 +215,7 @@ sub _userData { if ( my $error = $self->p->process($req) ) { if ( $error == PE_BADCREDENTIALS ) { $self->userLogger->warn( - 'Impersonation requested for an unvalid user (' + 'Impersonation requested for an invalid user (' . $req->{user} . ")" ); } @@ -229,7 +229,7 @@ sub _userData { $self->logger->info("\"$realId\" is an unrestricted user!") if $unUser; unless ( $unUser || $self->idRule->( $req, $req->sessionInfo ) ) { $self->userLogger->warn( - 'Impersonation requested for an unvalid user (' + 'Impersonation requested for an invalid user (' . $req->{user} . ")" ); $self->logger->debug('Identity NOT authorized'); diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/MailPasswordReset.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/MailPasswordReset.pm index 26f538313..47b579f1f 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/MailPasswordReset.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/MailPasswordReset.pm @@ -194,7 +194,7 @@ sub _reset { ); if ( my $error = $self->p->process( $req, useMail => $searchByMail ) ) { if ( $error == PE_USERNOTFOUND or $error == PE_BADCREDENTIALS ) { - $self->userLogger->warn( 'Reset asked for an unvalid user (' + $self->userLogger->warn( 'Reset asked for an invalid user (' . $req->param('mail') . ')' ); diff --git a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/SingleSession.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/SingleSession.pm index c8596d0d1..a6c974745 100644 --- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/SingleSession.pm +++ b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/SingleSession.pm @@ -163,7 +163,7 @@ sub removeOther { } else { $self->userLogger->warn( - "SingleSession called with an unvalid token"); + "SingleSession called with an invalid token"); $res = PE_TOKENEXPIRED; } } diff --git a/lemonldap-ng-portal/t/40-Notifications-Explorer-JSON-File.t b/lemonldap-ng-portal/t/40-Notifications-Explorer-JSON-File.t index fd80f94cb..9de9c44fb 100644 --- a/lemonldap-ng-portal/t/40-Notifications-Explorer-JSON-File.t +++ b/lemonldap-ng-portal/t/40-Notifications-Explorer-JSON-File.t @@ -55,7 +55,7 @@ expectOK($res); my $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1' ); -# Verify that cookie is ciphered (session unvalid) +# Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', cookie => "lemonldap=$id", @@ -82,7 +82,7 @@ expectOK($res); $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1' ); -# Verify that cookie is ciphered (session unvalid) +# Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', cookie => "lemonldap=$id", diff --git a/lemonldap-ng-portal/t/40-Notifications-Explorer-XML-File.t b/lemonldap-ng-portal/t/40-Notifications-Explorer-XML-File.t index 41aafe442..d727f5875 100644 --- a/lemonldap-ng-portal/t/40-Notifications-Explorer-XML-File.t +++ b/lemonldap-ng-portal/t/40-Notifications-Explorer-XML-File.t @@ -64,7 +64,7 @@ SKIP: { my $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1' ); - # Verify that cookie is ciphered (session unvalid) + # Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', cookie => "lemonldap=$id", @@ -90,7 +90,7 @@ SKIP: { $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1', 'reference1x2' ); - # Verify that cookie is ciphered (session unvalid) + # Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', cookie => "lemonldap=$id", diff --git a/lemonldap-ng-portal/t/40-Notifications-JSON-DBI.t b/lemonldap-ng-portal/t/40-Notifications-JSON-DBI.t index 1f8c1f726..4a473d3c1 100644 --- a/lemonldap-ng-portal/t/40-Notifications-JSON-DBI.t +++ b/lemonldap-ng-portal/t/40-Notifications-JSON-DBI.t @@ -137,7 +137,7 @@ q{INSERT INTO notifications VALUES ('rtyler','testref2','2050-05-30 00:00:00',?, or print STDERR Dumper( $res->[2]->[0] ); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); - # Verify that cookie is ciphered (session unvalid) + # Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', diff --git a/lemonldap-ng-portal/t/40-Notifications-JSON-File-with-token.t b/lemonldap-ng-portal/t/40-Notifications-JSON-File-with-token.t index 8d01b1570..60f77c3a5 100644 --- a/lemonldap-ng-portal/t/40-Notifications-JSON-File-with-token.t +++ b/lemonldap-ng-portal/t/40-Notifications-JSON-File-with-token.t @@ -59,7 +59,7 @@ expectOK($res); my $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); -# Verify that cookie is ciphered (session unvalid) +# Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', diff --git a/lemonldap-ng-portal/t/40-Notifications-JSON-File.t b/lemonldap-ng-portal/t/40-Notifications-JSON-File.t index aa2017760..c60532973 100644 --- a/lemonldap-ng-portal/t/40-Notifications-JSON-File.t +++ b/lemonldap-ng-portal/t/40-Notifications-JSON-File.t @@ -51,7 +51,7 @@ expectOK($res); my $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); -# Verify that cookie is ciphered (session unvalid) +# Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', @@ -97,7 +97,7 @@ expectOK($res); $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); -# Verify that cookie is ciphered (session unvalid) +# Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', diff --git a/lemonldap-ng-portal/t/40-Notifications-JSON-LDAP.t b/lemonldap-ng-portal/t/40-Notifications-JSON-LDAP.t index 63ccdff8c..caf27ea05 100644 --- a/lemonldap-ng-portal/t/40-Notifications-JSON-LDAP.t +++ b/lemonldap-ng-portal/t/40-Notifications-JSON-LDAP.t @@ -145,7 +145,7 @@ SKIP: { or print STDERR Dumper( $res->[2]->[0] ); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); - # Verify that cookie is ciphered (session unvalid) + # Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', diff --git a/lemonldap-ng-portal/t/40-Notifications-XML-DBI.t b/lemonldap-ng-portal/t/40-Notifications-XML-DBI.t index cf551ce20..33cc922a2 100644 --- a/lemonldap-ng-portal/t/40-Notifications-XML-DBI.t +++ b/lemonldap-ng-portal/t/40-Notifications-XML-DBI.t @@ -108,7 +108,7 @@ qq{INSERT INTO notifications VALUES ('rtyler','testref2','2050-05-30 00:00:00',' ok( $res->[2]->[0] =~ /1x1x1/, ' Found ref' ); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); - # Verify that cookie is ciphered (session unvalid) + # Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', diff --git a/lemonldap-ng-portal/t/40-Notifications-XML-File.t b/lemonldap-ng-portal/t/40-Notifications-XML-File.t index 2d91f44fb..9393be400 100644 --- a/lemonldap-ng-portal/t/40-Notifications-XML-File.t +++ b/lemonldap-ng-portal/t/40-Notifications-XML-File.t @@ -56,7 +56,7 @@ SKIP: { my $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); - # Verify that cookie is ciphered (session unvalid) + # Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', @@ -102,7 +102,7 @@ SKIP: { $id = expectCookie($res); expectForm( $res, undef, '/notifback', 'reference1x1', 'url' ); - # Verify that cookie is ciphered (session unvalid) + # Verify that cookie is ciphered (session invalid) ok( $res = $client->_get( '/', diff --git a/lemonldap-ng-portal/t/58-DecryptValue-with-internal-function.t b/lemonldap-ng-portal/t/58-DecryptValue-with-internal-function.t index 2fff67e43..177c05121 100644 --- a/lemonldap-ng-portal/t/58-DecryptValue-with-internal-function.t +++ b/lemonldap-ng-portal/t/58-DecryptValue-with-internal-function.t @@ -128,7 +128,7 @@ count(2); ( $host, $url, $query ) = expectForm( $res, undef, '/decryptvalue', 'cipheredValue', 'token' ); -# Unvalid ciphered value +# invalid ciphered value $query =~ s%cipheredValue=%cipheredValue=test%; ok( $res = $client->_post( @@ -138,7 +138,7 @@ ok( length => length($query), accept => 'text/html', ), - 'POST decryptvalue with unvalid value' + 'POST decryptvalue with invalid value' ); ok( $res->[2]->[0] =~ m%%, 'Found trspan="notAnEncryptedValue"' ) diff --git a/lemonldap-ng-portal/t/67-CheckUser.t b/lemonldap-ng-portal/t/67-CheckUser.t index 6ce55eac1..7f346a4e5 100644 --- a/lemonldap-ng-portal/t/67-CheckUser.t +++ b/lemonldap-ng-portal/t/67-CheckUser.t @@ -540,7 +540,7 @@ m%
%, ' PE5 found' -) or explain( $res->[2]->[0], 'PE5 - Unvalid identity' ); +) or explain( $res->[2]->[0], 'PE5 - invalid identity' ); count(2); $client->logout($id);